Search Results - (( variable visualization using algorithm ) OR ( based applications security algorithm ))
Search alternatives:
- variable visualization »
- based applications »
- using algorithm »
-
1
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
2
Application of Hybrid Evolutionary Algorithm and thematic map for rule set generation and visualization of chlorophyta abundance at Putrajaya lake / Lau Chia Fong
Published 2013“…This study describes application of a hybrid combination of hybrid evolutionary algorithm (HEA) and thematic map visualization technique in modeling, predicting and visualization of selected algae division growth, Chlorophyta for tropical Putrajaya Lakes and Wetlands (Malaysia). …”
Get full text
Get full text
Thesis -
3
-
4
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003Get full text
Get full text
Article -
5
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
ENGINEERING DESIGN WITH PSO ALGORITHM
Published 2019“…It assists design engineers as it gives a clearer visualization to predict which value of the variables gives a best produced result. …”
Get full text
Get full text
Final Year Project -
8
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
10
-
11
-
12
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
13
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…Particularly, this thesis aims to (1) minimize the interaction level of the computer-aided procedure, (2) visualize the arteries without obstruction and (3) detect the stenosis with consistent observation using the computer-aided procedure. …”
Get full text
Get full text
Thesis -
14
-
15
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
16
Survival versus non-survival prediction after acute coronary syndrome in Malaysian population using machine learning technique / Nanyonga Aziida
Published 2019“…Prediction, identification, understanding and visualization of relationship between factors affecting mortality in ACS patients using feature selection and ML algorithms. …”
Get full text
Get full text
Get full text
Thesis -
17
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
18
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
Published 2007“…Even though security requirements in medical care are traditionally high, most computerized medical care applications lack sophisticated security measures or focus only on single security objectives. …”
Get full text
Get full text
Thesis -
19
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
20
KNN Algorithm to Determine Optimum Agricultural Commodities in Smart Farming
Published 2023“…The algorithm used in this research is KNN, which was chosen because the variable has a numeric data type to perform the matching. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
